首页 > 最新文献

International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications最新文献

英文 中文
Rank Preserving Code-based Signature 基于秩保持码的签名
T. Lau, C. H. Tan
We propose a rank metric code-based signature scheme constructed via the Schnorr approach. We define a new problem in rank metric coding theory, namely the Rank Vector Decomposition problem and analyze its solving complexity. The hardness of our signature scheme is based on the Rank Syndrome Decoding problem, Rank Support Basis Decomposition problem and Rank Vector Decomposition problem. We also give detailed analysis for the structural security of our signature scheme. Then, we provide parameters for our constructed signature scheme and compare our scheme with other existing secure rank metric signature schemes. Our signature scheme requires only public key size of 443 bytes and signature size of 4.03 kilobytes for 128-bit security level.
我们提出了一种基于Schnorr方法构造的基于秩度量码的签名方案。我们定义了秩度量编码理论中的一个新问题——秩向量分解问题,并分析了其求解复杂度。我们的签名方案的硬度是基于秩综合征解码问题、秩支持基分解问题和秩向量分解问题。对签名方案的结构安全性进行了详细的分析。然后,给出了所构造的签名方案的参数,并与现有的安全等级度量签名方案进行了比较。对于128位的安全级别,我们的签名方案只需要443字节的公钥和4.03千字节的签名。
{"title":"Rank Preserving Code-based Signature","authors":"T. Lau, C. H. Tan","doi":"10.1109/ISIT44484.2020.9174058","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174058","url":null,"abstract":"We propose a rank metric code-based signature scheme constructed via the Schnorr approach. We define a new problem in rank metric coding theory, namely the Rank Vector Decomposition problem and analyze its solving complexity. The hardness of our signature scheme is based on the Rank Syndrome Decoding problem, Rank Support Basis Decomposition problem and Rank Vector Decomposition problem. We also give detailed analysis for the structural security of our signature scheme. Then, we provide parameters for our constructed signature scheme and compare our scheme with other existing secure rank metric signature schemes. Our signature scheme requires only public key size of 443 bytes and signature size of 4.03 kilobytes for 128-bit security level.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73675064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Buddhism and the Religious Other 佛教与其他宗教
E. Harris
Buddhism is sometimes characterized as having an inclusivist attitude to the religious Other. In the second decade of the twenty-first century, however, an exclusivist approach to the religious Other emerged in Sri Lanka. Using the case study of a Buddhist temple in Dambulla, this article examines the conditioning factors behind this phenomenon. It is divided into four sections. The first examines recent theoretical approaches to Buddhism and inter-religious encounter, and argues that a spectrum of Buddhist approaches to the Other has long been present in text and tradition. The second offers background information about the Dambulla temple and its leading monk, Inamuluwe Sumangala Thero. The third explores three representations of the mosque attack, those of Sumangala, the Hindus of Dambulla, and secular analysts. The fourth suggests three conditioning factors for the dominance of Sumangala’s representation and the emergence of what could be considered an uncharacteristically exclusivist Buddhist approach to the religious Other within South Asian Buddhism.
佛教有时被描述为对宗教他者持包容态度。然而,在二十一世纪的第二个十年,斯里兰卡出现了一种对宗教他者的排他性态度。本文以丹布拉佛寺为例,探讨了这一现象背后的制约因素。它分为四个部分。第一部分考察了佛教和宗教间相遇的最新理论方法,并认为佛教对他者的一系列方法长期以来一直存在于文本和传统中。第二部分提供了关于丹布拉寺庙及其主要僧侣Inamuluwe Sumangala Thero的背景信息。第三部分探讨了清真寺袭击的三种说法,分别是苏曼加拉、丹布拉的印度教徒和世俗分析人士的说法。第四个部分提出了三个制约因素,这些因素导致了苏曼加拉的表现占主导地位,并在南亚佛教中出现了一种可以被认为是对宗教他者的非典型的排他性佛教方法。
{"title":"Buddhism and the Religious Other","authors":"E. Harris","doi":"10.1558/isit.40147","DOIUrl":"https://doi.org/10.1558/isit.40147","url":null,"abstract":"Buddhism is sometimes characterized as having an inclusivist attitude to the religious Other. In the second decade of the twenty-first century, however, an exclusivist approach to the religious Other emerged in Sri Lanka. Using the case study of a Buddhist temple in Dambulla, this article examines the conditioning factors behind this phenomenon. It is divided into four sections. The first examines recent theoretical approaches to Buddhism and inter-religious encounter, and argues that a spectrum of Buddhist approaches to the Other has long been present in text and tradition. The second offers background information about the Dambulla temple and its leading monk, Inamuluwe Sumangala Thero. The third explores three representations of the mosque attack, those of Sumangala, the Hindus of Dambulla, and secular analysts. The fourth suggests three conditioning factors for the dominance of Sumangala’s representation and the emergence of what could be considered an uncharacteristically exclusivist Buddhist approach to the religious Other within South Asian Buddhism.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical Inference and Exact Saddle Point Approximations 统计推断和精确鞍点近似
P. Harrcmoes
Statistical inference may follow a frequentist approach or it may follow a Bayesian approach or it may use the minimum description length principle (MDL). Our goal is to identify situations in which these different approaches to statistical inference coincide. It is proved that for exponential families MDL and Bayesian inference coincide if and only if the renormalized saddle point approximation for the conjugated exponential family is exact. For 1-dimensional exponential families the only families with exact renormalized saddle point approximations are the Gaussian location family, the Gamma family and the inverse Gaussian family. They are conjugated families of the Gaussian location family, the Gamma family and the Poisson-exponential family. The first two families are self-conjugated implying that only for the two first families the Bayesian approach is consistent with the frequentist approach. In higher dimensions there are more examples.
统计推断可以遵循频率论方法,也可以遵循贝叶斯方法,或者可以使用最小描述长度原则(MDL)。我们的目标是确定这些不同的统计推断方法重合的情况。证明了对于指数族,当且仅当共轭指数族的重整化鞍点近似是精确的,MDL和贝叶斯推理是重合的。对于一维指数族,只有高斯位置族、伽玛族和逆高斯族具有精确的重整化鞍点近似。它们是高斯位置族,伽玛族和泊松指数族的共轭族。前两个族是自共轭的,这意味着只有对前两个族贝叶斯方法与频率论方法是一致的。在高维中有更多的例子。
{"title":"Statistical Inference and Exact Saddle Point Approximations","authors":"P. Harrcmoes","doi":"10.1109/ISIT.2018.8437697","DOIUrl":"https://doi.org/10.1109/ISIT.2018.8437697","url":null,"abstract":"Statistical inference may follow a frequentist approach or it may follow a Bayesian approach or it may use the minimum description length principle (MDL). Our goal is to identify situations in which these different approaches to statistical inference coincide. It is proved that for exponential families MDL and Bayesian inference coincide if and only if the renormalized saddle point approximation for the conjugated exponential family is exact. For 1-dimensional exponential families the only families with exact renormalized saddle point approximations are the Gaussian location family, the Gamma family and the inverse Gaussian family. They are conjugated families of the Gaussian location family, the Gamma family and the Poisson-exponential family. The first two families are self-conjugated implying that only for the two first families the Bayesian approach is consistent with the frequentist approach. In higher dimensions there are more examples.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78425236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topological structures on DMC spaces DMC空间的拓扑结构
Rajai Nasser
Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet X and output alphabet Y can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. We show that this topology is compact, path-connected and metrizable. A topology on the space of equivalent channels with fixed input alphabet X and arbitrary but finite output alphabet is said to be natural if and only if it induces the quotient topology on the subspaces of equivalent channels sharing the same output alphabet. We show that every natural topology is σ-compact, separable and path-connected. On the other hand, if |X| ≥ 2, a Hausdorff natural topology is not Baire and it is not locally compact anywhere. This implies that no natural topology can be completely metrized if |X| ≥ 2. The finest natural topology, which we call the strong topology, is shown to be compactly generated, sequential and T 4 . On the other hand, the strong topology is not first-countable anywhere, hence it is not metrizable. We show that in the strong topology, a subspace is compact if and only if it is rank-bounded and strongly-closed. We provide a necessary and sufficient condition for a sequence of channels to converge in the strong topology. We introduce a metric distance on the space of equivalent channels which compares the noise levels between channels. The induced metric topology, which we call the noisiness topology, is shown to be natural. We also study topologies that are inherited from the space of meta-probability measures by identifying channels with their Blackwell measures. We show that the weak-∗ topology is exactly the same as the noisiness topology and hence it is natural. We prove that if |X| ≥ 2, the total variation topology is not natural nor Baire, hence it is not completely metrizable. Moreover, it is not locally compact anywhere. Finally, we show that the Borel σ-algebra is the same for all Hausdorff natural topologies.
如果两个信道相互降级,则称它们是等效的。输入字母X、输出字母Y的等价信道空间,可以通过等价关系自然地赋予欧几里得拓扑的商。我们证明了这种拓扑结构是紧凑的、路径连通的和可度量的。具有固定输入字母X和任意但有限输出字母的等价信道空间上的拓扑,当且仅当它在具有相同输出字母的等价信道的子空间上推导出商拓扑时,称为自然拓扑。我们证明了每一个自然拓扑都是σ-紧的、可分离的和路径连通的。另一方面,如果|X|≥2,则Hausdorff自然拓扑不是Baire拓扑,它在任何地方都不是局部紧化的。这意味着如果|X|≥2,自然拓扑不可能被完全度量。最好的自然拓扑,我们称之为强拓扑,被证明是紧生成的、顺序的和t4的。另一方面,强拓扑在任何地方都不是首可数的,因此它是不可度量的。证明了在强拓扑中,子空间是紧的当且仅当它是秩有界且强闭的。给出了信道序列在强拓扑下收敛的充分必要条件。我们在等效信道空间上引入度量距离来比较信道间的噪声水平。诱导度量拓扑,我们称之为噪声拓扑,被证明是自然的。我们还研究了从元概率测度空间继承的拓扑,通过识别信道及其Blackwell测度。我们证明弱- *拓扑与噪声拓扑完全相同,因此它是自然的。证明了当|X|≥2时,总变分拓扑不是自然的,也不是贝尔的,因此它不是完全可度量的。此外,它在任何地方都不是局部紧凑的。最后,我们证明了对于所有的Hausdorff自然拓扑,Borel σ-代数是相同的。
{"title":"Topological structures on DMC spaces","authors":"Rajai Nasser","doi":"10.1109/ISIT.2017.8007115","DOIUrl":"https://doi.org/10.1109/ISIT.2017.8007115","url":null,"abstract":"Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet X and output alphabet Y can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. We show that this topology is compact, path-connected and metrizable. A topology on the space of equivalent channels with fixed input alphabet X and arbitrary but finite output alphabet is said to be natural if and only if it induces the quotient topology on the subspaces of equivalent channels sharing the same output alphabet. We show that every natural topology is σ-compact, separable and path-connected. On the other hand, if |X| ≥ 2, a Hausdorff natural topology is not Baire and it is not locally compact anywhere. This implies that no natural topology can be completely metrized if |X| ≥ 2. The finest natural topology, which we call the strong topology, is shown to be compactly generated, sequential and T 4 . On the other hand, the strong topology is not first-countable anywhere, hence it is not metrizable. We show that in the strong topology, a subspace is compact if and only if it is rank-bounded and strongly-closed. We provide a necessary and sufficient condition for a sequence of channels to converge in the strong topology. We introduce a metric distance on the space of equivalent channels which compares the noise levels between channels. The induced metric topology, which we call the noisiness topology, is shown to be natural. We also study topologies that are inherited from the space of meta-probability measures by identifying channels with their Blackwell measures. We show that the weak-∗ topology is exactly the same as the noisiness topology and hence it is natural. We prove that if |X| ≥ 2, the total variation topology is not natural nor Baire, hence it is not completely metrizable. Moreover, it is not locally compact anywhere. Finally, we show that the Borel σ-algebra is the same for all Hausdorff natural topologies.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89048546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A computer-aided investigation on the fundamental limits of caching 对缓存基本限制的计算机辅助研究
C. Tian
We considered the optimal memory-transmission-rate tradeoff of caching systems. Different from the conventional analytical approach usually seen in the information theory literature, we rely on a computer-aided approach in this investigation. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach, however our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several simple cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proved. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that strong outer bounds can be computed through strategically relaxing the LP. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.
我们考虑了缓存系统的最佳内存传输速率权衡。与信息论文献中常见的传统分析方法不同,我们在本研究中采用了计算机辅助方法。熵空间的线性规划(LP)外界作为这种方法的起点,然而我们的努力远远超出了用它来证明信息不平等。我们首先识别并形式化了问题中的对称结构,这使我们能够证明最优对称解的存在性。然后用一个对称简化的线性规划来确定几种简单情况下存储-传输速率权衡的边界,得到了一组紧的外边界。从这些计算数据中形成了最优权衡区域的一般假设,并对这些假设进行了解析证明。这将导致对只有两个用户的系统的最佳权衡的完整描述,以及对只有两个文件的系统的某些部分描述。接下来,我们表明,通过仔细分析某些情况下外界的联合熵结构,可以对新的代码结构进行逆向工程,从而最终生成一般类型的代码。最后,我们证明了可以通过策略放松LP来计算强外边界。这使我们首先可以推断出逆证明的一般特征,其次可以计算更大问题情况的外界,尽管计算规模看似不可能。
{"title":"A computer-aided investigation on the fundamental limits of caching","authors":"C. Tian","doi":"10.1109/ISIT.2017.8006556","DOIUrl":"https://doi.org/10.1109/ISIT.2017.8006556","url":null,"abstract":"We considered the optimal memory-transmission-rate tradeoff of caching systems. Different from the conventional analytical approach usually seen in the information theory literature, we rely on a computer-aided approach in this investigation. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach, however our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several simple cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proved. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that strong outer bounds can be computed through strategically relaxing the LP. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80035325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The ρ-capacity of a graph 图的ρ容量
Sihuang Hu, O. Shayevitz
Motivated by the problem of zero-error broadcasting, we introduce a new notion of graph capacity, termed ρ-capacity, that generalizes the Shannon capacity of a graph. We derive upper and lower bounds on the ρ-capacity of arbitrary graphs, and provide a tighter upper bound for regular graphs. The ρ-capacity is employed to characterize the zero-error capacity region of the degraded broadcast channel.
在零错误广播问题的启发下,我们引入了一个新的图容量概念,称为ρ-容量,它推广了图的香农容量。我们给出了任意图的ρ容量的上界和下界,并给出了正则图的一个更紧的上界。采用ρ-capacity来表征退化广播信道的零误差容量区域。
{"title":"The ρ-capacity of a graph","authors":"Sihuang Hu, O. Shayevitz","doi":"10.1109/ISIT.2016.7541770","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541770","url":null,"abstract":"Motivated by the problem of zero-error broadcasting, we introduce a new notion of graph capacity, termed ρ-capacity, that generalizes the Shannon capacity of a graph. We derive upper and lower bounds on the ρ-capacity of arbitrary graphs, and provide a tighter upper bound for regular graphs. The ρ-capacity is employed to characterize the zero-error capacity region of the degraded broadcast channel.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75117115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A partial order for the synthesized channels of a polar code 极性码的合成信道的一种偏序
C. Schürch
A partial order for the synthesized channels W N (i) of a polar code is presented that is independent of the underlying binary-input channel W. The partial order is based on the observation that W N (j) is stochastically degraded to W N (i) if j is obtained by swapping a more significant 1 with a less significant 0 in the binary expansion of i. We derive an efficient representation of the partial order, the so-called covering relation. The partial order is then combined with another partial order from the literature that is also independent of W. Finally, we give some remarks on how this combined partial order can be used to simplify code construction of polar codes.
给出了与底层二进制输入信道W无关的极性编码的合成信道wn (i)的偏阶,其偏阶基于这样的观察:如果j是通过在i的二进制展开中交换一个更有效的1和一个不太有效的0来获得的,则wn (j)会随机退化为wn (i)。我们推导了偏阶的有效表示,即所谓的覆盖关系。然后,将该偏阶与文献中另一个与w无关的偏阶结合起来,最后,我们给出了一些关于如何使用该组合偏阶来简化极坐标码的码构造的注释。
{"title":"A partial order for the synthesized channels of a polar code","authors":"C. Schürch","doi":"10.1109/ISIT.2016.7541293","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541293","url":null,"abstract":"A partial order for the synthesized channels W N (i) of a polar code is presented that is independent of the underlying binary-input channel W. The partial order is based on the observation that W N (j) is stochastically degraded to W N (i) if j is obtained by swapping a more significant 1 with a less significant 0 in the binary expansion of i. We derive an efficient representation of the partial order, the so-called covering relation. The partial order is then combined with another partial order from the literature that is also independent of W. Finally, we give some remarks on how this combined partial order can be used to simplify code construction of polar codes.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87085554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Capacity and power scaling laws for finite antenna amplify-and-forward relay networks 有限天线放大转发中继网络的容量和功率比例规律
D. Simmons, J. Coon, N. Warsi
A novel framework is presented that can be used to study the capacity and power scaling of linear multiple-input multiple-output (MIMO) d×d antenna amplify-and-forward (AF) relay networks. In particular, we model these networks as random dynamical systems (RDS) and calculate their d Lyapunov exponents. Our framework can be applied to systems with any per-hop channel fading distribution provided the expected logarithm of the channel matrices' norms are finite; in this contribution all of our results relate specifically to Rayleigh fading. Our main results are twofold: 1) the total transmit power at the nth node will follow a deterministic trajectory through the network governed by the network's maximum Lyapunov exponent, 2) the capacity of the ith eigenchannel at the nth node will follow a deterministic trajectory through the network governed by the network's ith Lyapunov exponent. Before concluding, we present some numerical examples to highlight the theory.
提出了一种新的框架,可用于研究线性多输入多输出(MIMO) d×d天线放大前向(AF)中继网络的容量和功率缩放。特别地,我们将这些网络建模为随机动力系统(RDS),并计算它们的d李雅普诺夫指数。我们的框架可以应用于任何每跳信道衰落分布的系统,只要信道矩阵范数的期望对数是有限的;在这个贡献中,我们所有的结果都与瑞利衰落有关。我们的主要结果是双重的:1)第n个节点的总发射功率将遵循由网络最大李雅普诺夫指数控制的网络的确定性轨迹,2)第n个节点的第i个特征信道的容量将遵循由网络第i李雅普诺夫指数控制的网络的确定性轨迹。在结束之前,我们给出了一些数值例子来突出这一理论。
{"title":"Capacity and power scaling laws for finite antenna amplify-and-forward relay networks","authors":"D. Simmons, J. Coon, N. Warsi","doi":"10.1109/ISIT.2016.7541621","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541621","url":null,"abstract":"A novel framework is presented that can be used to study the capacity and power scaling of linear multiple-input multiple-output (MIMO) d×d antenna amplify-and-forward (AF) relay networks. In particular, we model these networks as random dynamical systems (RDS) and calculate their d Lyapunov exponents. Our framework can be applied to systems with any per-hop channel fading distribution provided the expected logarithm of the channel matrices' norms are finite; in this contribution all of our results relate specifically to Rayleigh fading. Our main results are twofold: 1) the total transmit power at the nth node will follow a deterministic trajectory through the network governed by the network's maximum Lyapunov exponent, 2) the capacity of the ith eigenchannel at the nth node will follow a deterministic trajectory through the network governed by the network's ith Lyapunov exponent. Before concluding, we present some numerical examples to highlight the theory.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74872284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Minimax Rate-optimal Estimation of KL Divergence between Discrete Distributions. 离散分布间 KL Divergence 的最小率最优估计。
Yanjun Han, Jiantao Jiao, Tsachy Weissman

We refine the general methodology in [1] for the construction and analysis of essentially minimax estimators for a wide class of functionals of finite dimensional parameters, and elaborate on the case of discrete distributions with support size S comparable with the number of observations n. Specifically, we determine the "smooth" and "non-smooth" regimes based on the confidence set and the smoothness of the functional. In the "non-smooth" regime, we apply an unbiased estimator for a "suitable" polynomial approximation of the functional. In the "smooth" regime, we construct a bias corrected version of the Maximum Likelihood Estimator (MLE) based on Taylor expansion. We apply the general methodology to the problem of estimating the KL divergence between two discrete distributions from empirical data. We construct a minimax rate-optimal estimator which is adaptive in the sense that it does not require the knowledge of the support size nor the upper bound on the likelihood ratio. Moreover, the performance of the optimal estimator with n samples is essentially that of the MLE with n ln n samples, i.e., the effective sample size enlargement phenomenon holds.

我们完善了 [1] 中的一般方法,即构建和分析各类有限维度参数函数的本质最小估计器,并详细阐述了支持大小 S 与观察数 n 相当的离散分布的情况。具体而言,我们根据置信集和函数的平滑度确定了 "平滑 "和 "非平滑 "机制。在 "非平稳 "状态下,我们对函数的 "合适 "多项式近似采用无偏估计法。在 "平滑 "机制中,我们根据泰勒展开构建了最大似然估计器(MLE)的偏差修正版本。我们将一般方法应用于从经验数据中估计两个离散分布之间的 KL 分歧问题。我们构建了一个最小率最优估计器,它是自适应的,因为它不需要知道支持大小或似然比上界。此外,具有 n 个样本的最优估计器的性能基本上与具有 n ln n 个样本的 MLE 相同,即有效样本量扩大现象成立。
{"title":"Minimax Rate-optimal Estimation of KL Divergence between Discrete Distributions.","authors":"Yanjun Han, Jiantao Jiao, Tsachy Weissman","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>We refine the general methodology in [1] for the construction and analysis of essentially minimax estimators for a wide class of functionals of finite dimensional parameters, and elaborate on the case of discrete distributions with support size <i>S</i> comparable with the number of observations <i>n</i>. Specifically, we determine the \"smooth\" and \"non-smooth\" regimes based on the confidence set and the smoothness of the functional. In the \"non-smooth\" regime, we apply an unbiased estimator for a \"suitable\" polynomial approximation of the functional. In the \"smooth\" regime, we construct a bias corrected version of the Maximum Likelihood Estimator (MLE) based on Taylor expansion. We apply the general methodology to the problem of estimating the KL divergence between two discrete distributions from empirical data. We construct a minimax rate-optimal estimator which is adaptive in the sense that it does not require the knowledge of the support size nor the upper bound on the likelihood ratio. Moreover, the performance of the optimal estimator with <i>n</i> samples is essentially that of the MLE with <i>n</i> ln <i>n</i> samples, i.e., the <i>effective sample size enlargement</i> phenomenon holds.</p>","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5812299/pdf/nihms910323.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35842722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uplink interference reduction in Large Scale Antenna Systems 大规模天线系统中的上行干扰降低
Ansuman Adhikary, A. Ashikhmin, T. Marzetta
{"title":"Uplink interference reduction in Large Scale Antenna Systems","authors":"Ansuman Adhikary, A. Ashikhmin, T. Marzetta","doi":"10.1109/ISIT.2014.6875290","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875290","url":null,"abstract":"","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80865391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1